Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
01-11-2021 09:57
Static task
static1
General
-
Target
1d07ba3818460950a41107248ebad65eea18efc3c151aa275be107732f3625d6.exe
-
Size
703KB
-
MD5
3ea0aeb40da1e753c6b9ce2981d25e51
-
SHA1
3e28a132b435a95adfe9339f93556a78a4d0f41f
-
SHA256
1d07ba3818460950a41107248ebad65eea18efc3c151aa275be107732f3625d6
-
SHA512
cd45ff5a4aab4ff7c1d40c0554401c9170a61407df0e23f11f85a28b5733cd504a2c947e858639656b45edd968e544d2358ac350673b0fe384ef8ad641e8a592
Malware Config
Extracted
xloader
2.5
pufi
http://www.homestechs.com/pufi/
fusiongroupgames.net
hugevari.com
rebeccagriffiths.com
trocaoferta.com
theslashapp.com
codezonesoftware.xyz
sottocommunications.com
minicreators.online
course2millions.com
hfm5n1dhkjqwpe.xyz
xlab-ub.com
silvanaribeirocake.com
thefabinteriordesign.com
mg-leadership.com
petbort.com
ndust.net
203040302.xyz
jakital.com
shophuunghia.info
rednacionaldejuecesrd.net
mauricioeanderson.com
robinbirrell.top
zarazira.com
rescueandrestoreministries.net
tureformamadrid.com
heesafe.com
mistergoo.com
reklamilanlar018.xyz
dailygossiping.com
theebook.guru
keepkalmm.com
teamlsu.club
kendyraedesigns.com
suddennnnnnnnnnnn13.xyz
panaceapp.com
visionaryking83.com
50003008.com
bikingforbalance.com
nishiki-sougou.com
bricokitchen.com
478739.com
donaldpowers.store
lesspricebd.com
xn--tfr61gf5uuhm.group
mysterypowerbike.com
fractalmerch.xyz
foreverphotos0910.net
hungama-play30.online
negotrad.com
afroonline.net
avalche.com
northfacemall.online
deals4me.store
nadanadif.com
lnstagrarn-security.com
lewismiddleton.com
tefatistmus.quest
adavici.com
madnext.online
astraherb.com
phnurse.com
opinionprofesional.com
gameshill.net
kagakubushitsu.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1588-124-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1588-125-0x000000000041D450-mapping.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1d07ba3818460950a41107248ebad65eea18efc3c151aa275be107732f3625d6.exedescription pid process target process PID 2780 set thread context of 1588 2780 1d07ba3818460950a41107248ebad65eea18efc3c151aa275be107732f3625d6.exe 1d07ba3818460950a41107248ebad65eea18efc3c151aa275be107732f3625d6.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
1d07ba3818460950a41107248ebad65eea18efc3c151aa275be107732f3625d6.exepid process 1588 1d07ba3818460950a41107248ebad65eea18efc3c151aa275be107732f3625d6.exe 1588 1d07ba3818460950a41107248ebad65eea18efc3c151aa275be107732f3625d6.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
1d07ba3818460950a41107248ebad65eea18efc3c151aa275be107732f3625d6.exedescription pid process target process PID 2780 wrote to memory of 1588 2780 1d07ba3818460950a41107248ebad65eea18efc3c151aa275be107732f3625d6.exe 1d07ba3818460950a41107248ebad65eea18efc3c151aa275be107732f3625d6.exe PID 2780 wrote to memory of 1588 2780 1d07ba3818460950a41107248ebad65eea18efc3c151aa275be107732f3625d6.exe 1d07ba3818460950a41107248ebad65eea18efc3c151aa275be107732f3625d6.exe PID 2780 wrote to memory of 1588 2780 1d07ba3818460950a41107248ebad65eea18efc3c151aa275be107732f3625d6.exe 1d07ba3818460950a41107248ebad65eea18efc3c151aa275be107732f3625d6.exe PID 2780 wrote to memory of 1588 2780 1d07ba3818460950a41107248ebad65eea18efc3c151aa275be107732f3625d6.exe 1d07ba3818460950a41107248ebad65eea18efc3c151aa275be107732f3625d6.exe PID 2780 wrote to memory of 1588 2780 1d07ba3818460950a41107248ebad65eea18efc3c151aa275be107732f3625d6.exe 1d07ba3818460950a41107248ebad65eea18efc3c151aa275be107732f3625d6.exe PID 2780 wrote to memory of 1588 2780 1d07ba3818460950a41107248ebad65eea18efc3c151aa275be107732f3625d6.exe 1d07ba3818460950a41107248ebad65eea18efc3c151aa275be107732f3625d6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d07ba3818460950a41107248ebad65eea18efc3c151aa275be107732f3625d6.exe"C:\Users\Admin\AppData\Local\Temp\1d07ba3818460950a41107248ebad65eea18efc3c151aa275be107732f3625d6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1d07ba3818460950a41107248ebad65eea18efc3c151aa275be107732f3625d6.exe"C:\Users\Admin\AppData\Local\Temp\1d07ba3818460950a41107248ebad65eea18efc3c151aa275be107732f3625d6.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1588-124-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1588-125-0x000000000041D450-mapping.dmp
-
memory/1588-126-0x0000000001190000-0x00000000014B0000-memory.dmpFilesize
3.1MB
-
memory/2780-115-0x0000000000570000-0x0000000000571000-memory.dmpFilesize
4KB
-
memory/2780-117-0x00000000052A0000-0x00000000052A1000-memory.dmpFilesize
4KB
-
memory/2780-118-0x0000000004E80000-0x0000000004E81000-memory.dmpFilesize
4KB
-
memory/2780-119-0x0000000004DA0000-0x000000000529E000-memory.dmpFilesize
5.0MB
-
memory/2780-120-0x0000000004FE0000-0x0000000004FE1000-memory.dmpFilesize
4KB
-
memory/2780-121-0x00000000051D0000-0x00000000051D7000-memory.dmpFilesize
28KB
-
memory/2780-122-0x0000000008720000-0x0000000008721000-memory.dmpFilesize
4KB
-
memory/2780-123-0x00000000088C0000-0x000000000890C000-memory.dmpFilesize
304KB